Analysis

  • max time kernel
    195s
  • max time network
    220s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    10/06/2023, 20:41

General

  • Target

    enable-disable-com.motorola.mtk.gba.xml

  • Size

    348B

  • MD5

    9debcddcd4cbb44d37a10687a0886a71

  • SHA1

    df614be5ef57e537fd0a76a083d72fbce2b36c1d

  • SHA256

    5764917678357b50e7c5cdca482dce584635b21bf478e02dcb7524327ba12f74

  • SHA512

    9120e550050e3f6b4b79ec914963a1a45de62c4ee75818cbfd46443593bb443c12e0ea2b67cc9f4b5bf6031a82d903f250398301f2d8891e21210c133c19e7bd

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\enable-disable-com.motorola.mtk.gba.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:460
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1312
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1464

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    649b5bf45eedcaff273cc087602b5f44

    SHA1

    ce059f1dbcfc8b8583fea4c8a1089c46f572a067

    SHA256

    cb6037ea45c1cf9942051b478c9f781f753e7d227863a044a09750cb88856564

    SHA512

    daa8d2a7a86cb360a6b5c91e365c0ef6eb8266dfa64498c67725f1c64f041b0fa7edf785a3fa2f3778fddff3273f641379cebd96eee27330a56bab234ba3ab5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    77a3c2aba9e3a66114eda512351e2405

    SHA1

    dbeebe2a209ca056f3edbcd5cd4ad68bd38a2ec5

    SHA256

    a3c62925035683c858ab9685b7a60acf06f0c14d1e0bdc7e7ba552b5a05a6a6d

    SHA512

    9f0a82ecf0b7e92b8a29c0b4f459692338eeb516fc60aaee6eea651287cc62b2746a21ac533a33e948fdfde7dac1fd9cd59304cf3800a4b29a6b4bd9d66a5f3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9f24285faab0a1ce554de6994bda34bb

    SHA1

    dd867d99435dfb4b6d76a3cd845c831a03da3184

    SHA256

    a60f9edd404bd74e2b2af29e561b42d3ff6034dad1d2c0ab9a67e8383b3db733

    SHA512

    cbb0c1a7b014cab13eabf23fce4bd1b28163ec8459680f05d2cf19a224995f43ccb3ce37d5df58d8adcb0ce4b43d3ffdae81e0122573ba325a4e76f01feb04d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    513c63f1ff7de5d53717839fd2626947

    SHA1

    e6491825832a90010e5d9f180ecad37f832c2699

    SHA256

    5f895d7695a97a702381bb6d43275a2195b1302ee2a6aab11b28929777d67418

    SHA512

    61c01ebee9b1547edcab684e06539373c71899cd5ac6da8999dc8a2397943b9bf1a3d6c64d05451d387568547042a69dbb7138acd8a2c838d193a131c00f5934

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79ec689fbe31f255318104b57df5d035

    SHA1

    8a7c38f75a03e189a201541e29fbe5ebd5e404fa

    SHA256

    14581aa096496017e918188ae8478dae92643c6ff090bcfd2ac6563d153092e5

    SHA512

    33c3ca21e0b0c39d5f734803d793435fc49fe2f70b4099a7917dc17dac4507337dbfe3a24a9567872c21bc3c656ef0adb88c1558739425d21e80edc773bd98e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7f8f26c2597659bd8995057d02cfd6cc

    SHA1

    c6fdc95d1bc1e9f2f4f92c17c08ba195e9b9b5a4

    SHA256

    541eed12b6c5e7de3fcb29e3ed6634a780433dc0433a95a26a991ac819c85a8a

    SHA512

    97f42426ffda6104e3b840da0c6b39958ba12f40510d8e16006d9fe2a5f0d1d679df74263f2da519e83bd415443fd65abd44be1b31fd2f65abd5a2c96faddbb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fc12b73976d7998566e87eeddba19c92

    SHA1

    be972b377aa9d7f23897f6f5eb5295fd6c84781c

    SHA256

    d3fb36c4c11e60f2637464d2bd9c91314ad3f425bdd13f0a8829236dd0482a30

    SHA512

    b7964c7d39221c30161396ea81a3650678202cb963d42dc920a241fc30d2cc718eda907ab5c65d9f827a9dedda47824b0799fe2a04caba99600b651fd746ae8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b41aa667fd3857fb7d002543f67da110

    SHA1

    84f77251f255247dc5ebdfbd92b9c1b9f42e67a6

    SHA256

    7f7efd9714d252fe6ead176cfec31e3a58764dcbf7e6d2118577d7f83381dd9c

    SHA512

    f55957e0619b00df1671e92e82dba06a3d4b341a706b8cf226bf275a31cda5e7707067a7e9c4dede14ca08afefde21fe93c14c0c43e04280a443b79e2067997a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6e59cb956cb320c9226c7d11cc620ece

    SHA1

    939effe09dabd4237046aaa762c31623202301e6

    SHA256

    c8e461bba5e4041861b50b62ce668b56229cce3a3af43a7f454a9cc22fb0e523

    SHA512

    05b6947bacaa2f07bfc6b1ff5ef2337c1555a3bd8696ad3d6486efd96ff6cf260ba42872cdd2dc2229ac7cbfbd728ce5816330e12165baf91afbe26b02a68edb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5c6e4b6d7f082f638a09c5ca525704e3

    SHA1

    2ea8e1ee597fbb71fead4a28518ca5df9390f9cb

    SHA256

    c39430d141c5f9b61d9746f048eedf8719f9047d5f0de5612d67f7cd68da4651

    SHA512

    b5db9877e52220ef0471299f28acc43001cfd1c05f9ce3c5bf0e4f17a07e5b02d0c842c9183d6ae5d4bd7349eec3bfeb605a7d983115d61f82977ac75e32cfd6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4e65101f645a7e3ecfb3a801e6ce0c36

    SHA1

    95706a9c76b2c2b3b31d2236693379ab79f0b24b

    SHA256

    63f7d92176df4d7abb387b10ded95b9592788c922d666ac30d6f53b51a4dc99e

    SHA512

    4e18bb26fcb143790b8e5beee0b92279a79654d57aeacea3ab5a488a4489bb332203fdfdac53b91200f239e89e3d1ca1be5b86f132638bb44ec6719d3da6815a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4D33E1QE\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab4510.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Cab45EC.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar465E.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2L5H6ZU9.txt

    Filesize

    601B

    MD5

    3fd818399bce9ae490653b95f8f29aa8

    SHA1

    55b8bca3f04dbb908b8224b38d240b744c22974e

    SHA256

    c2f13b541eae800cf03c96ab1a6d29f3af26db1fad886c51c2078d7bab8303eb

    SHA512

    cac37d897df62b88c2ece03f4ce22cf628889f854a0ced45b5e20f2807ece725c4c616a6dd25d461457017e7d7fa0a3678e287950aedcbc8fc9b349ac7d78a6c